ASK is one of the top search engine but it is not as famous as Google, Yahoo or Bing. It was previously known as Ask Jeeves but now has been renamed to ASK. One annoying thing about ASK.com is the bundled toolbar with many software such as Nero, ZoneAlarm, SkyDownloader, VDownloader and many more. If a user did not read the agreements carefully during software installation and simply click on the Agree button, they will end up with an ASK toolbar replacing the browser’s home page and also search bar.
Fortunately ASK.com toolbar is not a spyware and it can be easily uninstalled from Add or Remove Programs in Windows XP or Programs and Features in Windows 7. If for some reason that you facing problems with the uninstallation, you can use ASK Toolbar Remover.
ASK Toolbar Remover has been designed specifically to remove every last trace of the entries of the Ask Toolbar. This portable free ask.com toolbar removal tool is used to facilitate its removal but not to advice you to remove it. All you need to do is run the executable file and click Execute Removal button. Do note that this remover only works on ASK Toolbar version 4.0.x, 4.1.x and OEM 1000. The current ASK Toolbar is at 5.6 and this tool doesn’t support removing this latest version of ASK toolbar.
Google search engine is the best in the world because of the complex algorithm of the index bot. Recently Google has SSL search which gives a more secure search. When a website is secured with SSL, the traffic that is sent and received from the website is encrypted and decrypting SSL is nearly impossible as it will take many many years to do crack it.
When you are in your company where your internet connection goes through a proxy server, the network administrator is able to tell what sites you have been and even probably what have you searched for. That includes cybercafe and your internet service provider. The packets that are sent without SSL is a clear traffic and can be easily decoded to view what you are trying to search.
Using Google SSL to search is easy and all you need to do is use HTTPS instead of HTTP at the URL address. For example, the normal google search engine is http://www.google.com and the secured SSL Google search would be https://www.google.com. Many other Google services such as Gmail, and Adsense can be used with HTTPS SSL as well.
Website login credentials can be stolen by hackers, social engineering or even by malicious tools such as keyloggers. A carefully planned hacker wouldn’t want to get detected and tries to stay in control of the account or computer as long as possible so that he can gather as much private information as possible about the user. This means that even if the hacker knows the password, they wouldn’t change them so that you wouldn’t suspect a thing. They would continue to snoop on your email, bank accounts, transactions and etc.
Facebook has a great security feature where it can notify you via email if someone logged in to your Facebook account from another computer, device or even location. All you need to do is to follow the steps the enable the privacy security protection.
1. Login to your Facebook account
2. Click on Account on the top right and select Account Settings
3. Click on Account Security and select Yes for “Would you like to receive notifications for logins from new devices.” and click Submit
4. Log out from Facebook and then relogin.
5. You will be prompted to register your computer by entering your computer name.
Your computer name will now be registered via cookie and if another computer or location logged in to your facebook account, you will receive an email notification. This may not be a perfect solution because the computer name can be changed but it does provide an extra layer to prevent against facebook snoopers.
Facebook is the largest social networking website where you can probably find a lot of personal information about people. It is useful in a way to keep in touch with friends that you have lost touch with but if you did not configure your privacy settings properly, you will end up leaking a lot of your personal private information which you don’t want people that you are not so closed with to know about it.
One easy way to quickly check if you have a privacy risk on your Facebook account is by using the free online service ReclaimPrivacy. If you are using Firefox web browser, all you need to do is drag the “Scan for Privacy” link to your bookmark toolbar, then login to your Facebook account and then click on the bookmark which you have just added. ReclaimPrivacy will automatically inspect your Facebook privacy settings and warn you about settings that might be unexpectedly public.
If your Facebook account has privacy risk, there is a button which seems to be able to fix the privacy setting automatically but we have tested it and it doesn’t seem to work. However there are direct link which brings you to the setting so you can turn it off.
When you delete a file, the operating system does not destroy the file contents from the disk – it only deletes some “references” on the file from some system tables. The file contents remains on disk until another file happens to overwrite it. Any software recovery tool can restore the data if it hasn’t been overwritten or thoroughly erased. Hardware recovery tools may even restore overwritten files by analyzing latent magnetic traces. As a result, your confidential information may be lying unprotected on your disk (not wiped, overwritten or erased) and it is almost impossible to prevent it from falling into the wrong hands.
East-Tec Eraser 2009 is a powerful software that cost $49.95 which is able to completely destroy information stored without your knowledge or approval: Internet history, Web pages and pictures from sites visited on the Internet, unwanted cookies, chatroom conversations, deleted e-mail messages and files, temporary files, the Windows swap file, the Recycle Bin, etc. You can start an on-demand erase by right clicking on a file and select Erase Beyond Recover.
1. Visit http://www.east-tec.com/offers/creativemark/2009/eraser/register.htm
2. Enter your name, email, agree the terms and click Submit button.
3. Check your email and click on the link to confirm the registration
4. Click the GET FREE KEY! button and note down the name and key.
5. Download East-Tec Eraser 2009 and install
6. Run East-Tec Eraser 2009 and a Reminder window will open asking you to activate the full version. Click Enter Key link. Ignore the hardware fingerprint, enter the Name, Key and click OK button.
Whenever you start using your computer, you are actually revealing a lot of personal information. The websites that you visit, the auto complete data that you type in to the text boxes, software that you installed, chat logs, files downloaded and many more. Caches are meant to make things easier and faster for a Windows user but overtime it can also pose as a privacy threat if a hacker or another user uses the computer.
Most applications allows you to clear the history data from the program options but it won’t be an easy job if you have installed many third party software plus Windows also has traces of what you have done on the computer. Encryption is pretty useless even if you protect your files because the temporary files that are frequently stored on your computer do not contain any encryption.
One easy way to delete any or all of these traces of your activity is by using Webroot Window Washer. When you run Window Washer the first time, it detects programs and paths that it can safely clean and by going to the Wash tab and click the Start button, it takes merely seconds to wash off your internet tracks and other traces of recent computer activity left by Windows and other software. It is possible to schedule for auto washing and also free space washing.
Webroot Window Washer 2010 v6.5.5 normally cost $29.95 for 1 year on 1PC but you can download the full setup installer at the link below. No registration key code require to activate the program since it is a full version.
A Windows computer can be shared with a few person and there are times when you would like to know what the other users has installed and ran on the computer before. They could have installed a hidden keylogger that steals your login information and see what you chat with other people. One of the way to know what are they doing in computer is by installing a keylogger but what if you want to know what program have they launched before? Fortunately Windows has a feature called UserAssist where it saves the encrypted information about the executable files and links that has been open frequently.
To decrypt and view the UserAssist data, you can use UserAssistView. This utility decrypt and displays the list of all UserAssist entries stored under HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist key in the Registry. This tool is portable and can run directly without installation. It shows a list of item name where the executable or shortcut file is ran how many times. The higher the number of count, the more often the program is being ran and that is what you should take note of.
UserAssistView works on Windows 2000, Windows XP, Windows Server 2003, Windows Vista and the recent updated v1.01 fixes to work properly under Windows 7.